Use-after-free in Linux kernel bpf



| Updated: 2025-05-10
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2022-49840
CWE-ID CWE-416
Exploitation vector Local
Public exploit N/A
Vulnerable software
Linux kernel
Operating systems & Components / Operating system

Vendor Linux Foundation

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Use-after-free

EUVDB-ID: #VU108224

Risk: Low

CVSSv4.0: 5.9 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2022-49840

CWE-ID: CWE-416 - Use After Free

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a use-after-free error within the bpf_test_init() function in net/bpf/test_run.c. A local user can escalate privileges on the system.

Mitigation

Install update from vendor's website.

Vulnerable software versions

Linux kernel: 5.15 - 5.15.79

CPE2.3 External links

https://git.kernel.org/stable/c/047824a730699c6c66df43306b80f700c9dfc2fd
https://git.kernel.org/stable/c/1b597f2d6a55e9f549989913860ad5170da04964
https://git.kernel.org/stable/c/730fb1ef974a13915bc7651364d8b3318891cd70
https://git.kernel.org/stable/c/7a704dbfd3735304e261f2787c52fbc7c3884736
https://git.kernel.org/stable/c/d3fd203f36d46aa29600a72d57a1b61af80e4a25
https://git.kernel.org/stable/c/e60f37a1d379c821c17b08f366412dce9ef3d99f
https://git.kernel.org/stable/c/eaa8edd86514afac9deb9bf9a5053e74f37edf40
https://mirrors.edge.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.15.80


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###